Wonderland

Penetration Testing Methodology
Reconnaissance
nmap
Enumeration
Directory Bruteforce using dirbuster & Gobuster
Exploitation
Privilege Escalation
Capturing the flag
user.txt
root.txt
Walkthrough - There is so many rabbit hole. Watch out.
nmap - to find open port
nmap -A 10.10.177.100
enumerate directory (Gobuster // Dirbuster)
gobuster dir -u http://10.10.177.100/ -w /root/List/directory-list-2.3-medium.txt -t 80 -x .txt,.php,.html
or
dirbuster
-> We can use any Gobuster or Dirbuster. But for this machine I recommend use dirbuster. It will make your task easier.
First

Second

Third

Fourth

Fifth

Sixth

Seventh

ssh
ssh *****@10.10.177.100
ls -al
Oops, there is root.txt. But we can't opened it.

Here, where the hint is really useful.

okay then we try a usual place for root.txt.
cat /root/user.txt

Well, that was an easy guess I think.
By AdaniKamal
Last updated